• Home
  • About Us
  • Authors
  • Submit News
  • Contact Us
  • Privacy Policy
  • Sitemap
The Hack Post
  • Hacking News
    • Cyber Crime
  • Cyber Security
  • Technology
    • Internet
  • Entertainment
    • Gaming
  • Business
  • Science / Health
No Result
View All Result
The Hack Post
No Result
View All Result

Joomla! 3.6.4 Admin TakeOver Exploit is Now Public

Alizaib Hassan by Alizaib Hassan
February 6, 2017
Share on FacebookShare on Twitter

A few days ago, a Joomla exploit has surfaced on the internet affecting the version 3.6.4 by allowing an attacker to take administrative control over the website using the Content Management System (CMS). An exploiter named Charles Fol has taken credit and has made the 0day public by posting it to exploit databases.

When the exploit is executed on a targeted Joomla website, it allows hackers to register and then provides and grants administrative privileges to the newly registered account.

Screenshot of Joomla! 3.6.4 Admin TakeOver Exploit
Screenshot of Joomla! 3.6.4 Admin TakeOver Exploit

Hackers can use this exploit to not only deface their web page but can also download their whole database, hijack traffic or even root the servers by uploading a malicious shell.

Staff at Joomla have not publicly addressed the exploit yet and it is unknown as of yet whether or not a patch has been released in response to the vulnerability.

A similar exploit has existed for versions 3.4.4 to 3.6.4 of Joomla. A video was uploaded on the 8th of November, 2016 by the user “Macedonian Security Crew” and it shows a full Proof of Concept (PoC). The video demonstrates an in-depth analysis on the exploit in a 23 minute display and gives further information on how to execute the exploit onto vulnerable websites using Metasploit.

The security staff at Joomla need to be on high alert and keep an eye out on vulnerabilities and exploits like these so clients and users who implement the Joomla CMS on their websites don’t feel threatened by the risk posed by malicious hackers and exploits. The severity of this exploit alone has been major, posing a very high-security risk for those vulnerable. The staff at Joomla can take a page out of their competitor WordPress’s book.

Recently a couple of vulnerabilities were found in WordPress’s REST API, which we reported on a few days ago. The security team at WordPress dealt with the situation much better by immediately deploying a patch for those affected by the bugs.

The severity of that exploit in comparison to this one is almost the same. So whether or not Joomla staff are aware of the bugs, they need to take initiative and solve the problem at hand faster. We advise those who are affected to upgrade to the latest version of the CMS to avoid falling victim to this admin takeover exploit.

Tags: Joomla 3.6.4 ExploitJoomla Exploit
Alizaib Hassan

Alizaib Hassan

Writer and content creator at The Hack Post. My adamant love for blogging, web development and programming has made me realise that contributing what I know is not only educative but also fun. Discussing topics with others is what drove me to become an author and I love every single moment of it. Founder of www.azhblog.com

Next Post

openSUSE Hacked by Kurdish Hacker

Latest Articles

Health Insurance Genrics 05
Business

Why Millennials are Opting for Individual Health Insurance Plans in 2025

February 10, 2026
Shahzaib Shah Gains International Attention for High-Impact Cyber Threat Research and Defensive Security Innovation
Cyber Security

Shahzaib Shah Gains International Attention for High-Impact Cyber Threat Research and Defensive Security Innovation

February 3, 2026
Smart baby gadgets and parenting tools for comfort, safety, and convenience at home
Business

5 Gadgets for Happier Babies and Easier Parenting

February 1, 2026
Essential DIY home repair tools and materials arranged on a wooden workbench for homeowners
Business

2026’s Must-Complete DIY Home Repairs for Every Homeowner

January 23, 2026
Therapist guiding couple through relationship counseling session for improved communication
Business

David Steinbok: Understanding Couples Therapy

January 23, 2026
GP_IMG_Silicon_Valley_Engineers_788x515
Business

Silicon Valley Engineers Are Choosing EB1A Over H1B and EB2 in 2026. Here’s Why

January 20, 2026
Smartphone displaying AI-generated voice assistant, symbolizing rising vishing cybersecurity threats
Cyber Security

The AI Clone in Your Pocket: Why ‘Vishing’ Is The Big New Threat

January 9, 2026
Image 1 of Mold Remediation Costs in Florida: The 2026 Guide for Homeowners
Business

Mold Remediation Costs in Florida: The 2026 Guide for Homeowners

January 9, 2026
Table tennis paddle and ball demonstrating spin technique for Shlomo Adelman spin shots overview
Entertainment

Shlomo Adelman: A Basic Overview of Spin Shots in Table Tennis

January 2, 2026
Adorable puppy wearing a red bow surrounded by Christmas gifts under a decorated holiday tree
Entertainment

A Gift for Life: Factors to Weigh When Giving a Pet this Christmas

December 26, 2025
Ai augmented
Business

AI-Augmented EB1A Pathway: How AI Improves EB1A Petitions

December 23, 2025
Lentor Gardens Residences modern condominium exterior in Singapore with lush landscaping
Business

Lentor Gardens Residences Condo: Redefining Modern Urban Living in Singapore

December 19, 2025
  • Home
  • About Us
  • Authors
  • Submit News
  • Contact Us
  • Privacy Policy
  • Sitemap

The Hack Post © 2019

No Result
View All Result
  • Hacking News
    • Cyber Crime
  • Cyber Security
  • Technology
    • Internet
  • Entertainment
    • Gaming
  • Business
  • Science / Health

The Hack Post © 2019